Saturday, November 30, 2019

Karam Pizza

Strengths Unusual menu choices Since its establishment, Karam Pizza has seen a tremendous growth because of the extraordinary menu choices its clients have. Karam Pizza brings together wide variety of Italian and Indian cuisines. This extraordinary menu is the Karam’s biggest strength that increases its competitive advantage.Advertising We will write a custom case study sample on Karam Pizza specifically for you for only $16.05 $11/page Learn More Quality food Along with providing unique menu, the pizzerias are also committed to providing quality products to its customers. Given the fact that the competitors are capable of copying and introducing the pizzeria unique menu, the only way to differentiate its food is through quality. This will ensure the customers sustainability. Large customer base accruing from the working vicinity The large pull of customers is strength to the business. The customer base consists of the delivery businesses as well as the increasing number of the office workers. These large pools of customers will result into increases in pizzeria sales revenues. This will eventually be used for its expansion and growth. Strong reputation The reputation of the business as the only restaurant that offers unique and best quality is another strength of the business. The reputation ensures increased clientele as well as helping in building the brand loyalty. The strong reputation the business has built in the last three years will help it retain its customers. It will also aid the business gain the needed competitive edge. Weaknesses Incapacity to service the incoming customers The pizzeria-limited capacity to service large pool of walk-in customers contributes negatively to its sales revenues. As the restaurant reputation grew the capacity to serve its customers especially during dinnertime was limited. The limitations were seen in terms of the quantity of food as well as efficiency in delivering services. Order delays together with low food productions have made the restaurant lose some of its customers who made it succeed. Limited funds The restaurant lack of funds is a hindrance to its rapid expansion. Karam Pizza is just a mere one-shop restaurant. Therefore, it has not generated enough pool of capital to expand on its operations. Moreover, the restaurant is not large enough to benefit from the economies of scale. Lack of enough capital has a negative effect on its capacity to deliver services to its clienteleAdvertising Looking for case study on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Very focused on specific kinds of food Another weakness the restaurant is facing is the lack of diversification. The restaurant specializes only on one of its combined cuisines. Unlike its competitors that have diversified offers, the restaurant only offers one best combination. This would lead the restaurant into losing its competitive edge. This is because some independent competitors are adding favorite items into their menus thus luring more customers who are loyal to Karam Pizza. Opportunities Rapid growth reported in the market segment There is growth potential in the restaurant business as more and more cuisines are needed. Moreover, the growing number of the working class in the community the restaurant operates provides a new opportunity for the business growth. Besides the growing number in the walk-in customers, there is simultaneous growth in the number of business within the area. This also presents a growth opportunity for the business. New menus that are without direct competitors The restaurant has an opportunity to offer new menus that are not presented by other competitors. Offering a new menu that is different from those in the market can provide the restaurant with an increased competitive edge. The opportunity to offer new menu with no direct competitors will increase the demand for its food i tems thereby increasing the customer base. Increased demand for take away The restaurant should take advantage of the increasing demand for take-away. The increasing number of take-away customers that throng the restaurant during evening hours offers an incentive for the growth of the restaurant. The restaurant should increase its capacity to meet the rising demand that will eventually provide revenues for expansion. The potential to expand the business There are several opportunities for the business to expand particularly into new areas. Moreover, the business can expand its services into the business-to-business basis. Other areas where the business can expand its services are the business functions including sales meetings and birthday lunches. Threats Competition emerging from well-established restaurants The biggest threat facing the restaurant is competition from large and well- established restaurants. These restaurants already have networks around the town where Karam is op erating. Moreover, independent competitors that offer some of its combinations also pose serious threats to the business.Advertising We will write a custom case study sample on Karam Pizza specifically for you for only $16.05 $11/page Learn More Competitors are likely to adopt the same menu The combinations that are being offered by the pizzeria can easily be copied by other restaurants. Currently, the independent is already offering some of its combinations luring some of its customers to their businesses. This result is reduced number of its customers and sales revenue. Besides, the pizzerias are facing the threat of increases in prices of inputs as well as the cost of doing business. Alternatives that would meet pizzerias’ objectives Increase its capacity and efficiency Karam Pizza has the alternative of increasing its capacity to meet the needs of all its customers. In essence, the restaurant should thrive to ensure that both the walk-in and business customers are serviced as required. The advantage is that the business will continue to expand its sales at the same time building its reputation and brand image. Another advantage is that the business will not continue to lose its customers instead, increase its customer base. However, increasing the capacity can be costly to the business. The other disadvantage is that the pizzeria will be forced to charge different prices. Lower prices will be charged to individual walk-in customers while higher prices will be charged to business deliveries. Expand into the business-to- business deals Though the business-to-business deals might not be potential now, it offers the best opportunity for the future. As the number of business increases, the business-to-business deliveries are viable for the future growth. The advantage of business-to-business deliveries is that they are highly priced thereby increasing revenue for the business. Another advantage is that such deliveries are un demanding since they only require a few staffs to accomplish. The disadvantage with these kinds of businesses is that they are prone to competition. Furthermore, they may take long before making any payments. Reducing prices With increased competition from independent pizzerias offering similar combination of cuisines, Karam Pizza can opt for price reductions. However, to attain the reduced prices objective, the business must offer large quantity of food at the same time increasing its efficiency. Mass production will cover the cost while ensuring that the business enjoys economies of scale. However, in situations where the customer base reduces, the reduction of prices will not be viable. Moreover, the competitors can also reduce their prices. This will have an adverse effect on the business strategy.Advertising Looking for case study on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More This case study on Karam Pizza was written and submitted by user Hailee Livingston to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Tuesday, November 26, 2019

oncology essays

oncology essays Cancer covers a large group of diseases that have malignant properties. This means that there is a tendency to grow and spread, sometime rapidly and sometimes slowly. Doctors identify the cancer by the site or type of cell type where it starts. For example, there are many types of cancers. Cancer in the uterus is uterine cancer; cancer in the breast is breast cancer; and cancer in the colon is colon cancer. The physician who specializes in the treatment of cancer is called an oncologist and the doctor who reviews and diagnoses the disease is called a pathologist. The test they take, the ultrasound of your abdomen and pelvis, indicated that you have renal-cell carcinoma of the right kidney. This is a cancer of the genitourinary system. It is also the most common type of kidney cancer and it used to be called hypernephroma. We do not know exactly how cancers start but this type of cancer is thought to be associated with smoking. However, statistics show that only about one-third of renal cell carcinoma is associated with smoking and it happens twice as often in men as in women. Let me explain how the kidneys work. First of all, we have two kidneys and they produce urine in a two-part process. In the first process, the kidneys filter the blood through filters called glomeruli. These filters separate the blood cells, that is, the red cells, white cells and platelets, from the liquid part which is called the plasma. The liquid part passes through tubules and is processed so that needed materials are returned to the blood and unwanted waste materials are passed on. In the second process, the kidneys collect the liquid that will be urine and pass it into many different bigger tubules until it gets to a port called the pelvis of the kidney. Then the urine flows to the ureter, which is a thin tube that leads to the bladder. One good thing to remember is a person can live with only one kidney and can also liv ...

Friday, November 22, 2019

A Business Relationship

In the short story ‘A Business Relationship’ Carl’s character is revealed as a simple man. He doesn’t need anything over the top, he’s practical when it comes to money and housework, and he’s incredibly thoughtful when it comes to his wife. To start, Carl seems to be a pretty simple man. The way the author describes their home; he didn’t need much to be happy.They had a small house, and not a lot of money but he was satisfied. When it came to their wedding, he wore an old black suit where the minister’s and the janitor were the only witnesses. Secondly, Carl was very practical. When it came to money, he knew exactly how to handle it. He didn’t want to waste it when he didn’t think he needed to use it. For example in the story, when Olga wants to take him to the hospital he refuses. He thinks it’s too expensive to stay there, and that they don’t have enough money for it. Lastly, he was very thoughtful when it came to his wife.When she stated she’d like to look out while she was working at the counter, he built her a window immediately. He liked to compliment her, for example on her gardening, he says ‘no one would ever know you hadn’t come from the country’. And when he had the extra money he’d brought her ‘marigolds and snapdragons to add to her border of wildflowers’. In conclusion, the way the author wrote the story, you can tell a lot about Carl’s personality. The way he speaks, how his wife acts around him, and in what he does. He lives a simple happy life, and he doesn’t need anything more to be pleased.

Wednesday, November 20, 2019

Source evaluation Essay Example | Topics and Well Written Essays - 750 words - 4

Source evaluation - Essay Example study were subjected to writing as well as reading assessments and the parents were given a set of questionnaires to fill in information regarded their views on video games. The parents were to do some analysis as well as to take up roles in the study behavior of their children as to see if what they had been instructed to undertake were actually true over a period of four months. (Weis, Robert, and Brittany C. Cerankosky, 12-17). They then filled in another set of questionnaire at the end of the four months and those results were heavily relied upon by the two psychologists to come up with their final analysis and conclusion. The study revealed that young boys who did not own video games put their parents under pressure to buy them such items. Upon receiving them, they become their main source of addiction. They noted that boys who had acquired the system began to register low academic performance in schools. Their research proved that video games were not appropriate among school going boys who could no longer concentrate in their studies thus having lower reading and writing scores. Video games have caused a displacement in the after-school activities such as artistic games that had a lot of positive impact on the academic performance of students. This book is of great importance to this research owing to the fact that it expands on the role of video games on academic performance among children. The article was published in Sage on 18th February 2010 which makes it very relevant for the purpose of this study. They developed an understanding on the correlation between playing of violent video games and violent antisocial behavior in the society. The book considers how playing video games may lead to children and the youth acquiring violent attitudes. The relationship between the two variables is best evident among children who spent a lot of time playing the games. There are fewer factors to cause alarm in the video gaming industry provided that adequate steps

Tuesday, November 19, 2019

Risk and uncertainty Essay Example | Topics and Well Written Essays - 500 words

Risk and uncertainty - Essay Example In contrast, there is an uncertainty when individuals are not informed of the outcome or of its distribution. Some authors suggest that risk is about the outcome of events whereas the uncertainty is specifically related to its probability. An effective inventory management is essential to ensure the better use of inventory. If the prevailing economic and market conditions are favourable, the organisation may use the inventory at its best level to generate more profits. Likewise, the firm should not choose to use inventory on a large scale when the existing business conditions are not promising. Businesses should use their excess capacity once they identify an emerging opportunity to expand their market territory or to increase sales volume. For instance, firms may use their excess capacity in peak seasons to take advantages of the favourable market situation. A cake manufacturing company must use its excess capacity in festival seasons like Christmas, New Year, and Easter because there will be an increase in the market demand of cake during these seasons. By using the excess capacity, the company can improve its production capacity to meet the increased supply needs. In addition, a company can use its excess capacity when demand conditions are favourable. To illustrate, a company would experience increased demand for its products/services following a positive review by reputed agencies and therefore the company must increase its capacity to benefit from this particular business situation. A number of strategies can be used to minimise risk/uncertainty exposure during the product launch (Harley Davidson low-to-the-ground hover bikes). It is clear that the organisation would not be informed of many risks and uncertainties when it launches the product into the market. A prior market survey can really assist the organisation to minimise its risk/uncertainty exposure to a great extent. The business can make use of the wide popularity of the social

Saturday, November 16, 2019

Cyber Bullying Essay Example for Free

Cyber Bullying Essay Walking through the school door, she feels the sweat dripping down the side of her cheeks. Her stomach flips and flops, and her hands have an obvious tremble. The slamming lockers and running footsteps are enough to make her eyes swell with tears. The snickers behind her are all too familiar, but she is not prepared for the shove to the back and degrading names that follow. In a split second, her mind is made up. She turns around, heads out the door, and doesn’t look back. The computer, her cell phone, and now school. The cyber-bullies have stepped out of the screen and into face-to-face contact. With this new kind of bully on the rise and ruthless, is she the school’s responsibility? Schools should be held responsible for cyber bullying because the crime extends from the computer to the school setting. Studies indicate that cyber-bullying incidents have quadrupled in past five years (Ross). Cyber-bullying has become a huge issue recently. Every time you turn on the news there is another bullying, or a suicide related to bullying, incident being reported. Love is louder† has been a common phrase among celebrities and influential figures lately. They are trying to send out a message to their followers saying that bullying is not right and should not be tolerated. The expansion of communication technologies is widening the way bully’s can torture their victims. The fact of the matter is, technology is not going anywhere, so we need to figure out a way to put an end to cyber-bullies. Cyber-bullying is becoming a major problem and we all need to do our parts in figuring out what can be done to stop cyber-bullies in their tracks. Cyber-bullies will continue to be a threat to today’s youth until we take preventative measures against them. Before putting a stop to cyber-bullying we must understand why and how a cyber-bully works. After researching and analyzing informative articles on the topic, this research paper aims to inform and answer questions such as: what a cyber-bully is, how they work, whom they target, and how to stop them. By understanding how a cyber-bully works we will be able to better protect youth populations as technology grows. Approximately half of U. S. students are impacted by traditional bullying each school day (Ross). Cyber-bullying is technology powered and as technology expands it is getting harder and harder to see and prevent bullying from happening. Bullying over the Internet makes it easy for the tormenter to get away with their destructive behavior without any consequences. The article, â€Å"What is Cyberbullying: Bullying Comes Home† states, â€Å"Bullying is not new but thanks to the Internet teens are now being bullied at home. Online harassment is a serious problem† (Hardcaslte). Although the Internet has opened many doors to new opportunities, it has unfortunately taken bullying to another level. As the article, â€Å"Cyber Bullying Facts† states, â€Å"as the number of households with Internet access approaches saturation and cell phone ownership expands to the 100 million mark, so do the ways kids bully each other† (Ross). Anything sent out into cyberspace is very difficult, sometimes impossible, to remove. Therefore, being cyber-bullied can sometimes be much more severe than traditional bullying. Ann Frisen in the article, â€Å"Cyber-bullying: A Growing Problem† states, â€Å"This type of bullying can be more serious than conventional bullying. At least with conventional bullying the victim is left alone on evenings and weekends† (ScienceDaily). What exactly is ‘cyber-bulling’? The author of the article, â€Å"What is Cyberbullying: Bullying Comes Home† explains it as, â€Å"any harassment that occurs via the Internet† (Hardcastle). Cyber-bulling messages can be communicated through text, e-mails, instant messaging, web pages, blogs, chat rooms, or any other information communication technologies. For example, Michigan’s assistant attorney general, who is a grown adult, has been harassing the University of Michigan’s openly gay student body president. Andrew Shirvell, assistant Michigan attorney general, created a blog in April of 2010 targeting Chris Armstrong, University of Michigan’s student body president. On this blog he has posted many rude, untrue, and unnecessary comments towards Chris Armstrong, along with distorted pictures. According to the article, â€Å"Assistant Michigan AG targets openly gay college student† the author states, â€Å"Shirvell has published blog posts that accuse Armstrong of engaging in ‘flagrant sexual promiscuity’ with another male member of the student government; sexually seducing and influencing ‘a previously conservative male student’ so much so that the student, according to Shirvell, ‘morphed into a proponent of the radical homosexual agenda’† (Steward). Mr. Shirvell is clearly a first-hand example of a cyber-bully and this article goes to show that it’s not just kids bullying each other in school anymore; it’s much bigger than that. There have been at least three teen suicides in September after experiencing homophobic cyber-bullying. Who are the main victims targeted by cyber-bullies? According to the article, â€Å"Cyber-bullying Facts† Middle school and High school girls are twice as likely as boys to display cyber-bullying behaviors in the form of email, text, and chat, and only 20% of cyber-bullying victims tell their parents about the incident (Ross). Cyber-bullies target students, coworkers, neighbors, and even friends. Lately, there have been many reports of suicides related to bullying. For example, the recent death of Tyler Clementi, a freshman at Rutgers University, is an extreme case of cyber-bullying. The article, â€Å"Rutgers student death: Has Digital Age made students callous† informs, â€Å"Mr. Clementi killed himself on September 22nd, 2010. According to prosecutors, a few days earlier his roommate, Dharun Ravi, and another student, Molley Wei, used a Web cam to secretly transmit images of a sexual encounter between Clementi and another man. They intended to do so again on September 21† (Khadaroo). With cyber-bullying a bully can pick on people with less risk of being caught. People who you would not see bullying someone in school don’t have a problem using the Internet to bully their victims because you can’t see their initial reaction. Bullying cannot only hurt the victim emotionally it can also cause them to have frequent headaches, indigestion and vomiting, loss of sleep, loss of appetite, paranoia, and suicide. In Tyler Clementi’s case he was so overwhelmed by what had been done to him that he jumped off of the George-Washington Bridge. It is important for college campuses to promote tolerance for differences, including homosexuality. From the article, â€Å"Rutgers student death: Has Digital Age made students callous† the author states, â€Å"We are tempted to think that social-media technology drove the behavior, but as a truly ethical matter, the behavior has to be and should be considered human-driven, not technology driven† (Foulkrod). Harrisburg University of Science and Technology in Pennsylvania recently blocked the use of social media for a week to prompt discussions about its role in everyday life. Nobody wants to see this happen again; therefore, we need to come up with a solution to the problem. Some observers of today’s youth and media culture believe that today’s media environment could be desensitizing young people to the hurtful effects of their actions. What can be done to prevent cyber-bullying? Parents can start by talking specifically about yber-bullying and explain that is harmful and unacceptable behavior. Talk regularly with your child about on-line activities he or she is involved in, keep your home computer in easily viewable places, such as a family room or kitchen, and consider installing a filtering or blocking system (Ross). Also, you can â€Å"outline your expectations for responsible online behavior and clearly explain the consequences for inappropriate behavior† (Ross). The most important thing that can be done to stop a cyber-bully harassing you is to just not respond to the bully. Do not play into the bully’s games. Ignore the bully and tell a parent or teacher. While ignoring the bullying make sure to save all of the evidence so that if police need to be involved you will have it ready. In the article, â€Å"What is Cyberbullying: Bullying Comes Home† states, â€Å"Repeated or excessive harassment via email, forums or chat rooms is harassment and should involve the police. Threats of violence should also be reported to the police. Try to save all messages as evidence† (Hardcastle). Treat a cyber-bully like you would any other bully and they will lose their power. Another important way to prevent cyber-bullying attacks is if you see something going on don’t just be a bystander and let it happen, report it before anyone gets hurt. In conclusion, with the expansion of the Internet and social networking technologies cyber-bullying is becoming more common and more severe. The information presented in this research paper should give people a better understanding of what a cyber-bully is, how harmful they can really be, and how to prevent cyber-bullying from happening. This paper can be used to help victims realize they are not alone and should not give into a bully’s dangerous behaviors. This research paper is to inform society about what has been going on lately and how unacceptable and dangerous it is. Kids are killing themselves over photos, web posts, and videos posted by bullies using the Internet. Cyber-bullying is technology powered and will only get worse as technology becomes more widespread. Hopefully, this paper will help to inform today’s youth and parents. If you see any kind of bullying happening in front of you, stop it if possible, and then report it. Conclusion Cyberbullying is a growing issue in schools. Students have been in fights, brought guns to school, and even committed suicide because of being cyberbullied. This is an issue which is a growing problem and must be addressed. It is serious. By helping students research the issues around cyberbullying, it raises awareness for both students and staff. A WebQuest like this can make a real difference in school climate and student relations. Take a stand against cyberbullying with your classmates. Students will listen to other students more quickly than they will listen to an adult.

Thursday, November 14, 2019

Genetic Engeneering of Food Essay -- Environment Science Debate Engine

Genetic Engeneering of Food Throughout the United States and the rest of the globe, genetically engineered food products are becoming increasingly used in agricultural and manufactured food goods. Because of the increase of genetically altered foods, an increasing population has become hesitant to accept the products and agriculture derived from genetic engineering. The large increase in genetically engineered foods has proved to have adverse health effects on humans. These health risks are becoming increasingly common as we continue to genetically alter foods. The main health concerns of genetic modification include virus spread, antibiotic resistance, and allergen effects. Genetic modification should stop and organic farming should be used instead for the future health of the planet. Provided evidence will support the claim that, genetically engineered food will have lasting effects on the population, the health in each of the provided categories will decline, and world hunger will actually increase with th e high amounts of genetically altered food products. Genetically modified foods are altered through inserting foreign genes or chromosomes to receive a desired trait or effect in the plant. According to Lappee and Bailey (1998) the most common form of genetic modification the chromosomes inside the nucleus which contains the blueprint information for building the plant or fruit. A genetic engineer will identify the chromosome which of the desired trait, which they wish to alter. Inserted into the DNA strand of the chromosome is a gene that the team wishes to modify. Along with the gene is a marker gene which scientists can use to locate the new gene. Together the team of genes is called an insertion package and... .... For the good of the nation and the world it is important for people to know, that they don?t have to eat what corporate business wants them to. Bibliography: Barnett, A. (2000, August 13). What?s Wrong with Our Food? Retrieved March 31, 2002 from web at: http://www.netlink.de/gen/Zeitung/2000/000813.html Cummins, J. Cauliflower Mosaic Virus Recombination , When and Where? Retrieved March 31, 2002 from web at: http://www.twnside.org.sg/title/mosaic-cn.htm Grogan, J. & Long C. (2000). The Problem with Genetic Engineering, Boston MA: Pearson Custom Publishing. Lappe, M. & Bailey, B. (1998). Against the Grain: Biotechnology and the Corporate Takeover of Your Food. Monroe, ME: Common Courage press. Wolfson, R. Synthetic Genetically-Engineered Bio-Tech Foods Retrieved March 31, 2002 from web at: http://eagle.westnet.gr/~aesclep/bioengl.htm

Monday, November 11, 2019

Gulf Oil Analysis Essay

Statement of Problem & Alternatives George Keller of the Standard Oil Company of California (Socal) is considering how much to bid for Gulf Oil Corporation (Gulf), which is currently in the middle of a bidding war. Gulf is unwilling to consider bids below $70 per share even though their share price was $39 at the time Boone Pickens began purchasing shares in the hopes of a takeover. II. Statement of Facts and Assumptions Under the direction of James Lee, Gulf pursued a twofold strategy. First, Gulf renewed its focused on oil whereas in the past, Gulf had developed into an energy conglomerate through various acquisitions of coalmines, uranium mines, and synthetic fuel plants. These ventures would be de-emphasized going forward. For second part of the strategy, Gulf planned to implement a policy of increased expenditures on exploration and development (E&D). During the years leading up to the takeover attempt, Gulf more than doubled its exploration outlays. While Gulf was continuing with its ambitious E&D program, the real price of oil and natural gas declined from 1982 through 1983. As 1984 began, almost all industry experts were in agreement that the price of oil (in constant dollars) was not expected to change for the following 10 years. Lee trimmed exploration expenditures in 1983 in response to these changing fundamentals. Even at the reduced level, spending for exploration in real terms equaled or exceeded that of every year before Lee’s arrival except one. Based on this picture, Socal needs to value Gulf. There are several sources of value that can be considered: the value of Gulf’s petroleum reserves; the cost savings related to the immediate suspension of Gulf’s E&D program; the tax benefits associated with additional leverage; the value added by shortening the recovery lag; and the value of any adverse effe cts due to the acquisition of Gulf by a competitor1. In addition to calculating Gulf’s reserve value, Socal needs to be mindful of its competition. Both Atlantic Richfield Company (ARCO) and Kohlberg Kravis  Roberts & Company (KKR) are financially limited should Gulf’s share price continue to escalate. It would be difficult for ARCO to bid more than $75.00 per share given that its resulting debt-to-capital ratio would exceed 60% (historically high). KKR is in a similar situation. Mesa, led by Pickens, currently holds 13.2% of Gulf’s stock at an average purchase price of $43. In order to bid successfully, Mesa would have to borrow many times their net worth. With banks queuing up to lend money to support an $80 share price (or higher), Socal will have to take on a considerable amount of financial leverage. III. Analysis Although there are multiple sources of value, this analysis focuses on valuing Gulf’s reserves, assuming E&D activities will cease post acquisition (liquidation value). The critical elements that enter into the valuation of Gulf’s reserves are: Acquisition date: Since we are trying to establish why Gulf became so valuable within a short period of time from when their share price was $39 to when a minimum bid level of $70 per share was established, it’s appropriate to use January 1st, 1984 as the first year Socal assumed ownership of Gulf. Reserve life: Assumed a reserve-to-production ratio of 12:1. It takes approximately 4 years for the stream to come online and the field, once online, is productive for another 7-10 yrs. Based on this ratio, Gulf’s reserves are depleted at a rate of 192.75 million barrels per year over a 12-year period. Inflation rate: 4.67% based on the average inflation rates observed between 1982 and 1983. There was an unusually high rate of inflation between 1978 and 1981 so years prior to 1982 were not included. However, a sensitivity analysis was performed to observe the effects of a higher inflation rate based on historical averages (see Exhibit 1). Oil sales: Oil price is expected to stay at $22.42 in constant dollars (prices are adjusted for inflation). Production costs: Production cost per barrel is expected to stay at $6.48 in constant dollars (prices are adjusted for inflation). See Exhibit 2. Exploration costs: The capitalized portion of past extraction costs are recognized as depreciation when the corresponding oil is produced. These depreciation expenses vary from year to year based on historical costs. See Exhibit 3. Working capital: For this analysis, working capital is assumed to be negligible given that the analysis is geared towards determining Gulf’s reserve value. Capital  expenditures: For this analysis, capital outlays are assumed to be zero given that the analysis is geared towards determining Gulf’s reserve value. Gulf’s E&D program ceases post acquisition. Discount rate: Gulf’s weighted average cost of capital calculated to be 15.35%. See Exhibit 4. Utilizing a discount rate of 15.35% and the assumptions outlined above with a free cash flow model (see Exhibit 6), Gulf’s reserves are worth an estimated $80.73 share ($16,120.69M)2. Adjusting the inflation upwards to 8.37%, Gulf’s reserves are worth an estimated $96.16 per share ($15,895.35M). Since Socal would be taking on additional debt, it’s important to check whether or not future free cash flows cover the incremental interest expense. Exhibit 7 shows that future cash flows easily cover interest expense associated with up to a $90 per share purchase price. Additionally, taking the free cash flow derived in Exhibit 6 (basis for an $80.73 share price) and discounting based on Socal’s WACC (16.96% – see Exhibit 5), we arrive at a reserve valuation of $75.56 per share. Adjusting inflation upwards to 8.37% and discounting at Socal’s WACC, Gulf’s reserves are worth an estimated $89.65 per share.3 IV. Recommendations Based on the analysis, a bid of $75.56 per share for Gulf is appropriate. A bid above this price would result in a loss for Socal shareholders. This price is also above the $75 threshold, which if offered by ARCO or KKR would send their leverage above historical highs (greater than 60%). Given the valuations sensitivity to the assumed inflation rate, discount rate, and recovery lag, $75.56 represents a pessimistic valuation giving Socal management room to adjust its bid upwards if necessary. These estimates do not consider the possibility of recovering Gulf’s unrelated fixed assets. It’s important to note, the analysis is very sensitive to the discount rate assumed, recovery lag, and the inflation rate.

Saturday, November 9, 2019

Reaction Paper on Cybercrime Act of 2012

Cybercrime Law in the Philippines The Cybercrime Prevention Act of 2012, signed by President Benigno Aquino III on Sep. 12, aims to fight online pornography, hacking, identity theft and spamming following local law enforcement agencies' complaints over the lack of legal tools to combat cybercrime. However, the law came with tougher legal penalties for Internet defamation, compared to traditional media. It also allows authorities to collect data from personal user accounts on social media and listen in on voice and video applications such as Skype, without a warrant.Users who post defamatory comments on Facebook or Twitter, for example, could be sentenced to up 12 years in jail. The Cybercrime Prevention Act of 2012, also known as Republic Act 10175, may aim to bring crime-fighting into the 21st century by addressing harmful acts committed with the use of the worldwide web but it raises the risk of rights violations and curtailment of freedom of expression and of the press by expandin g the concept of the criminalized act of libel.The law also raises the penal sentence for libel committed in cyberspace one year longer than that imposed in the Revise Penal Code for libel in general. The salient features of the Act include internationally consistent definitions for certain cybercrimes, nuanced liability for perpetrators of cybercrimes, increased penalties, greater authority granted to law enforcement authorities, expansive jurisdictional authority to prosecute cybercrimes, provisions for international cybercrime coordination efforts and greater ability to combat cybercrimes.It is highly advisable that the imperfections in the law, the provisions that conflict with other aspects of good governance and national and international obligations, be corrected soon through amendments. Strong leadership does not shirk from acknowledging the need to revise and strengthen policy and law. The calls for amendment should not be seen as personal attacks on anyone’s charact er or effectiveness. The Office of the President has replied to the outcry against the libel provision in the new law by saying that freedom comes with responsibility.Yes, and, indeed we all have responsibilities to respect the rights of others and the press is obliged to observe professional ethical standards, but the regulation of freedom, in order to impose responsibility and order, should not cross the line into curtailment of the freedom or creating an environment in which such rights cannot be fully and equally enjoyed. While the Convention does allow sovereign governments to regulate freedom of expression, such regulation should be done in a way that does not curtail the freedom. The Committee further elaborates in General Comment No. 4 (2011), â€Å"States parties should consider the decriminalization of defamation and, in any case, the application of the criminal law should only be countenanced in the most serious of cases and imprisonment is never an appropriate penalty. † Among the ironies of the relatively quick passage of this legislation and the timing thereof: 1. It is not compliant with the ICCPR, which was ratified by President Corazon C. Aquino, after decades of non-ratification by President Ferdinand Marcos; 2. It was signed by President Benigno S.Aquino III days before the country marked the 40th anniversary of the declaration of Martial Law, a period whose chief characteristics include repression of the freedom of expression, freedom of the press, and the right to political participation and dissent; and 3. The 1987 Constitution, whom the President and all the lawmakers have sworn to uphold has a number of provisions with which this law is not consistent, including the provision that â€Å"No law shall be passed abridging the freedom of speech, of expression, or of the press†¦ â€Å" (Art. 3, Sec. ), the guarantee of â€Å"full respect for human rights,† the recognition of â€Å"the vital role of communication and inf ormation in nation-building,† and the inviolable â€Å"right of the people to be secure in their persons, papers and effects against unreasonable searches and seizures. † I believe that the cybercrime prevention law is constitutional. It has undergone many examinations before making it to the president’s office. The president himself examined and even signed it. If it were unconstitutional, the senate would have noticed it during the revision period.Many members of the senate should have reacted earlier than they did. Many of them only reacted when the law caught the public’s attention. I think, therefore, that the senators deemed it constitutional before their opinion was tainted with the public’s comments. I am neither against nor pro cybercrime prevention law. I believe the author of the law is only thinking of protecting his countrymen from malicious people of the internet. I would like to believe that he really didn’t mean to suppress ou r freedom of expression in writing this bill. The law itself does not really state that we can’t write anything we want.I guess the objective of this bill is to teach Filipino people responsible usage of the internet. People who are victims of slander and other libelous act done on the internet have no way to go when their reputation is being attacked. Due to the passage of this law, there can now be protection for these victims. On the other hand, the law has its own flaws. The public are feeling uncomfortable that there is a group of people monitoring their activity on the net. For some, especially socially awkward people like me, the web is their only escape from their life.And the idea that someone is watching over that new life you built is just plain unthinkable. It restricts the way you speak by simply being there. It is worse than having people actually look at the real you because you don’t know who would be looking and when they would be looking. The way you act will change whether you like it or not. There is also major mass hysterics because of the act of banning websites such as Piratebay where people can usually download stuffs for free. I, for one, is also against this. Students like me have limited allowance.How are we expected to pay for movies, songs, games? These free stuffs help us relax and unwind after heavy school work. How will we indulge ourselves in these luxuries if these sites will be banned? When the bill became a law and much more when no temporary restraining order was issued a day prior to its implementation, the whole Philippines was in rage. In Facebook and Twitter alone, various opinions on why it shouldn’t have been signed to become a law in the first place were shared by different people – concerned citizens, most of them.But it is not a secret that what enraged most Filipinos is the inclusion of Libel in the law. According to Article 353 of the Revised Penal Code: A libel is public and malicious imputation of a crime, or of a vice or defect, real or imaginary, or any act, omission, condition, status, or circumstance tending to cause the dishonor, discredit, or contempt of a natural or juridical person, or to blacken the memory of one who is dead. Although the definition is said to have been modified to fit the Internet, people still dispute this simply because it violates their rights for freedom of speech and expression.The lawmakers say that when a person says something ‘negative’ about something or someone that can already be grounds for libel. What if I say â€Å"I am so disappointed with [person/brand]. What a lousy service! † Is this libelous or what? What if I criticize a member of the Senate for his unlawful action? Can that person sue me for libel? What if the person who wrote an article was only disseminating valuable information that people should know? Will he/she be held liable for it? When they start with the amendments, our lawmakers shou ld not forget ARTICLE III Section 4 of the 1987 Constitution. Section 4.No law shall be passed abridging the freedom of speech, of expression, or of the press, or the right of the people peaceably to assemble and petition the government for redress of grievances. I believe a person’s entitled to his/her own opinion. And the whole Philippines shouldn’t carry the burden of being silenced just because other people couldn’t accept this fact. Sorces: http://www. zdnet. com/ph/philippine-cybercrime-law-under-fire-6th-petition-filed-7000005076/ http://www. interaksyon. com/article/44546/cybercrime-law-may-put-philippines-in-more-trouble-with-un-for-curtailing-press-freedom Roni Lyn B. Amaranto AT 110

Thursday, November 7, 2019

USSR.

USSR. In the 1930's, change was a key part of the USSR, as radical changes were taking place in every aspect of peoples lives. In this essay, I will be looking at the extent of the changes that Stalin imposed on the USSR.The driving force behind all of the changes taking place in the USSR was the second revolution or 'the revolution from above', where instead of the population revolting, the top of the hierarchy implemented the revolution by imposing big changes throughout the country, the major change was the removal of capitalism and the re-introduction of socialism through the collectivisation and industrialisation processes, whereby all production in agriculture and industry was made by the population as a whole in collective factories and farms, with all produce going to the state to be 're-distributed'.Here I will examine the first set of changes made by Stalin, economic change.English: Joseph StalinAs I have talked about already, the really major economic change was the switch from capitalism back to socialism. Originally the NEP was still in effect as the remains of Lenin's reign at the top, but Stalin disliked this as it was capitalism which went against his beliefs and policies, so he set about modernising the USSR. He put this plan into practice by collectivising the agricultural industry, by claiming state ownership of all rural land and property, then merging several small privately owned farms into a one large collectivised farm, in these farms, everyone in the local area would work together to create a large amount of produce, which would then be sent away to a headquarters for redistribution and for export.In the industrial sector, socialist ideas were also in place, as in more urban areas, collective factories were established where large scale production took place, similarly...

Monday, November 4, 2019

Protection and Advocacy disparity for Mentally Ill Persons Research Paper

Protection and Advocacy disparity for Mentally Ill Persons - Research Paper Example In the recent past, advocacy widened to entail the prerequisites and needs of people with trivial psychological conditions, today, the protection and advocacy concept covers everyone that is part of the mental health treatment processes. The different initiatives are supposed to benefit the mental health patients and their families at depth; however, in some areas, the concept is not that effectual. The comprehensive movement markedly influences cerebral wellbeing initiatives and regulation in some countries where there is significant improvement but some of the areas still need addressing. Appreciably, the concept of advocacy takes responsibility of elevated awareness of the significance of mental health as a prevailing and common condition in people. The main concern comes in because of the neglecting of treatment and care of the mentally ill in the dissertation around healthiness, privileges and equivalence2 (Kenneth, 2014, 1). This is confounding because psychological incapacities are prevalent, affecting a significant number of people around the globe. Additionally, the familiarity of people with cerebral infirmity is one categorized by diverse intertwined echelons of disparity and discrimination within the social order. Strategies aimed at achieving correct parity of every one need comparable determinations to realize applicable egalitarianism for people with psychological incapacities. Essentially, fundamental aspects such as deficiency, inequity, vagrancy and acumen are major contributors to the jeopardy for mental illness treatment and care; in fact, they faci litate most of the negative influences increasing overall disparity3 (WHO, 2003, 6). An approach based on psychological susceptibility should focus on exploiting the normal human aspects of patients by valuing their intrinsic formality, personal

Saturday, November 2, 2019

Women and Children of the Crusades Essay Example | Topics and Well Written Essays - 2000 words

Women and Children of the Crusades - Essay Example The movement, nevertheless, is documented to happen sometime between Easter and the Pentecost and spread across northern France, Flanders, and Western Germany.1 As for women, their roles in the crusades are often not well-documented, most likely because of their gender, although some scholars have started to examine the chronicles and annals more closely to examine women’s participation in the crusades.2 Sources note that women played diverse roles during the crusades and that their home based functions should not be overlooked at all, since they kept the household and businesses alive, while their male family members were away, or died in the crusades.3 The Children’s Crusade is an effort to reclaim the Holy Land from the infidels, while the women played diverse direct and indirect roles in the military, spiritual, and financial aspect of the Crusades. The Children’s Crusade has been argued as a reaction of the disappointed youth with the crusaders, because they have not yet reclaimed Jerusalem from the infidels. They were made of children and other adolescents, who aimed to reach the Holy Land and retrieve it from the Muslims. Madden calls the Children’s Crusade as not a real crusade, but more of a collection of uprisings and processions, where the core medieval belief is that poverty will help them achieve their holy goals.4 This can be rooted that Jesus favored the poor over the rich, and so they must have believed that if the poor led the crusades, their victory will also be assured by Jesus Christ.5 Since this crusade by the children was a popular movement, its origins and developments are difficult to trace. None of the participants wrote about the event in a firsthand manner, for instance, as in the more official forms of crusades.6 In â€Å"The Children’s Crusade,† Munro reviews the veracity of the chronicles regarding the Children’s Crusade. She notes that for accounts regarding the French children, the most reliable sources are the unspecified chroniclers of Laon, Mortemer, Jumieges, and Andres.7 She notes that these writers markedly illustrated the same movement, but few facts are presented except for one of them. She provides brief accounts from each, where the story of the holy shepherd boy called Stephen can be narrated. On June, 1212, Stephen from the village of Cloyes, near Vendome, declared that the Lord had appeared to him, dressed as a poor pilgrim, had taken bread from him, and had provided him a letter to bring to the King of France.8 He travelled to S. Denis with shepherds of his own age and there the Lord performed numerous miracles through him, as many have witnessed.9 There were also many other boys who went with him and performed miracles. Numerous children joined them, as if they were to be long-term followers of the holy boy Stephen whom they all perceived as their master and prince.10 The bands, made of girls, boys, adolescents and several older persons, parade d through the cities, castles, towns, and villages, holding banners, candles, and crosses, and censers, singing in their language, â€Å"Lord God, exalt Christianity! Lord God, restore to us the true cross.†11 They sang these words and many more, which attracted more followers to the procession. When the children were asked by their parents or others where they would go, they would shout in unison: â€Å"To God.†12 The children could not be stopped initially, but based on the records of Jumieges, they went home when they got hungry.13 The Laon chronicle stated that the king, upon consultation with the masters of the University of Paris about this matter, finally ordered the children to go back home.14 The other two chroniclers do not provide any ending to this procession. As for the prevalence of the movement, one